US9355104B1 - Intelligent pairing using a lookup database for snapshot based backups - Google Patents
Intelligent pairing using a lookup database for snapshot based backups Download PDFInfo
- Publication number
- US9355104B1 US9355104B1 US13/842,710 US201313842710A US9355104B1 US 9355104 B1 US9355104 B1 US 9355104B1 US 201313842710 A US201313842710 A US 201313842710A US 9355104 B1 US9355104 B1 US 9355104B1
- Authority
- US
- United States
- Prior art keywords
- source
- snapshot
- target device
- pairing
- storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 claims abstract description 155
- 238000003860 storage Methods 0.000 claims abstract description 96
- 230000008859 change Effects 0.000 claims description 35
- 238000013500 data storage Methods 0.000 claims description 17
- 238000004590 computer program Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 claims 1
- 238000004519 manufacturing process Methods 0.000 abstract description 11
- 238000004891 communication Methods 0.000 description 16
- 238000010200 validation analysis Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 11
- 238000010586 diagram Methods 0.000 description 9
- 238000013459 approach Methods 0.000 description 5
- 230000014759 maintenance of location Effects 0.000 description 5
- PMHURSZHKKJGBM-UHFFFAOYSA-N isoxaben Chemical compound O1N=C(C(C)(CC)CC)C=C1NC(=O)C1=C(OC)C=CC=C1OC PMHURSZHKKJGBM-UHFFFAOYSA-N 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000004075 alteration Effects 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000005192 partition Methods 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 239000000523 sample Substances 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 230000015556 catabolic process Effects 0.000 description 1
- 238000010367 cloning Methods 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000006731 degradation reaction Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 239000004557 technical material Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G06F17/30088—
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
- G06F11/1451—Management of the data involved in backup or backup restore by selection of backup contents
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1456—Hardware arrangements for backup
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/84—Using snapshots, i.e. a logical point-in-time copy of the data
Definitions
- the present invention relates generally to computer systems and specifically to systems and methods of backing up data on computer systems.
- Snapshot based backups have been in play for some time and are gaining traction at a swift pace.
- snapshot based backups may be made manually based on experience or random approaches.
- the manual approach has several drawbacks.
- data change rate may fluctuate. Having a fixed snapshot method may not be ideal or optimized over time. For example, SNAP may be a good choice on a day when data changes very little, but may not be optimal next day, when the data change rate is more than 50%. Further, on a day when there is no or very few data changes, unnecessary snapshots may waste system resources.
- different method may require different configuration, such as different pairing source and target devices pairing and provisioning, among others. Manual configuration may not keep up.
- traditional approach of managing snapshot based backups without any intelligence built-in is both inadequate and inefficient.
- FIG. 1 is a block diagram of a storage system for snapshot based backups in accordance with some embodiments.
- FIG. 2 is a diagram of exemplary policies and the application of policies at various points in time of snapshot based backups in accordance with some embodiments.
- FIG. 3 is a diagram of snapshot policy configuration in a storage system in accordance with some embodiments.
- FIG. 4 is a flow chart illustrating a method of intelligent snapshot based backups in accordance with some embodiments.
- FIG. 5 is a schematic diagram illustrating intelligent pairing at various points in time of snapshot based backups in accordance with some embodiments.
- FIG. 6 is a flow chart illustrating intelligent pairing of devices for snapshot based backups in accordance with some embodiments.
- FIG. 7 is a schematic diagram illustrating intelligent pairing using a lookup database for snapshot based backups in accordance with some embodiments.
- FIG. 8 is a flow chart illustrating a method of intelligent pairing using a lookup database for snapshot based backups in accordance with some embodiments.
- FIG. 9 is a flow chart illustrating a method of intelligent configuration for snapshot based backups in accordance with some embodiments.
- a computer-usable medium or computer-readable medium may be any medium that can contain or store the program for use by or in connection with the instruction execution system, apparatus or device.
- the computer-readable storage medium or computer-usable medium may be, but is not limited to, a random access memory (RAM), read-only memory (ROM), or a persistent store, such as a mass storage device, hard drives, CDROM, DVDROM, tape, erasable programmable read-only memory (EPROM or flash memory), or any magnetic, electromagnetic, infrared, optical, or electrical means or system, apparatus or device for storing information.
- RAM random access memory
- ROM read-only memory
- a persistent store such as a mass storage device, hard drives, CDROM, DVDROM, tape, erasable programmable read-only memory (EPROM or flash memory), or any magnetic, electromagnetic, infrared, optical, or electrical means or system, apparatus or device for storing information.
- the computer-readable storage medium or computer-usable medium may be any combination of these devices or even paper or another suitable medium upon which the program code is printed, as the program code can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.
- Applications, software programs or computer-readable instructions may be referred to as components or modules. Applications may be hardwired or hard coded in hardware or take the form of software executing on a general purpose computer or be hardwired or hard coded in hardware such that when the software is loaded into and/or executed by the computer, the computer becomes an apparatus for practicing the invention.
- Storage is widely used for storing data associated with computer systems.
- Storage may be primary storage used for routinely accessed information, or secondary storage providing redundant or archival storage for data recovery in case of data loss in the primary storage system.
- primary storage include systems referred to as “production”, “source”, or “working” data storage systems.
- secondary storage include systems referred to as “backup” or “target” systems.
- Storage devices may be, for example, disk devices that store data on one or more types of media, including magnetic, optical, or other type of media used for storing data. More particularly, disk devices may be arranged into one or more data storage areas, referred to in the art as “volumes” that are capable of being accessed by one or more computer systems, referred to as “hosts.”
- a host may be a client or a server.
- a volume may be commonly defined as a virtual storage area into which a file system, database management system, or other system or process places data.
- a volume may include a single partition of a disk device or multiple partitions located on one or more physical storage devices.
- volumes are managed by the storage systems which are computer systems that provide storage-related services to hosts.
- the hosts communicate with a storage system through a communication medium such as a network.
- Typical networks used to transfer data between hosts and storage systems include Fibre Channel, SCSI, Ethernet, Gigabit Ethernet, and other types of communication networks. Data is transferred between systems using one or more communication protocols as is well-known in the art.
- FIG. 1 shown is a system level block diagram illustrating one embodiment that may be used in connection with performing the techniques described herein.
- a plurality of data blocks may be generated and accessed by a plurality of Hosts 140 a - 140 n .
- Hosts 140 a - 140 n and Server 160 may access Data Storage System 100 , for example, in performing input/output (I/O) operations, data requests, and other operations.
- Data Storage System 100 may store data on Source 120 and Target Device Group 130 .
- Target Device Group 130 may include one or more Snapshot Storages 132 - 136 that may be paired to Source 120 .
- Source 120 and one or more devices from Target Device Group 130 may be paired, so that Source 120 may be used for routinely accessed information, and the one or more devices from Target Device Group 130 may be used to provide redundant or archival storage.
- Target Device Group 130 may include devices that may be used for snapshot storage.
- Target Device Group 130 may be configured to include different types of snapshot storage, such as Snapshot Storage Clone 132 , Snapshot Storage SNAP 134 , and/or Snapshot Storage Other 136 , among others. If a device is not in Target Device Group 130 , intelligent pairing for snapshot based backups may not use it as a target to pair with Source 120 .
- Snapshot Storages 132 - 136 within Target Device Group 130 are shown in FIG. 1 as being in a data storage location different from Source 120 , it should be appreciated that Snapshot Storages 132 - 136 and Source 120 may be located in and controlled by separate systems, or may be located within and controlled by the same Data Storage System 100 .
- Data may be located in same or different systems, which may be physically within the same physical enclosure, or may be located in different physical enclosures connected by one or more communication links.
- a device used at a first point-in-time as Source 120 may be configured to be used at a second point-in-time as a device within Target Device Group 130 for storing snapshots.
- a device configured within Target Device Group 130 and used at a first point-in-time for storing snapshots may be used at a second point-in-time as Source 120 for storing production data.
- the Communication medium may be any one or more of a variety of networks or other type of communication connections as known to those skilled in the art.
- Each of the communication mediums may be a network connection, bus, and/or other type of data link, such as a hardwire or other connections known in the art.
- the communication medium may be the Internet, an intranet, network or other wireless or other hardwired connection(s) by which Host systems 140 a - 140 n may access and communicate with other components (shown or not shown in FIG. 1 ).
- the communication medium may be a LAN connection or an iSCSI or fibre channel connection.
- Each of Host systems 140 a - 140 n and Data Storage Systems 100 may be connected to the communication medium by any one of a variety of connections as may be provided and supported in accordance with the type of communication medium.
- Server 160 may be connected to the communication medium by any one of variety of connections in accordance with the type of communication medium.
- the processors included in Host computer systems 140 a - 140 n and Server 160 may be any one of a variety of proprietary or commercially available single or multi-processor system, such as an Intel-based processor, or other type of commercially available processor able to support traffic in accordance with each particular embodiment and application.
- Snapshot Storages 132 - 136 are shown in FIG. 1 as being in a data storage location included within the same Data Storage System 100 as Source 120 , it should be appreciated that Snapshot Storages 132 - 136 and Source 120 may be located in and controlled by separate systems, or may be located within and controlled by the same Data Storage System 100 . Data may be located in same or different systems, which may be physically within the same physical enclosure, or may be located in different physical enclosures connected by one or more communication links. In some embodiments, Server 160 may direct the writing of the snapshot data to different storage devices over a communication medium. It should also be appreciated that one or more physical storage devices (e.g., disk drives) may be used to create a volume, and that snapshot operations may involve copying between sets of storage devices. Other configurations of a storage system are possible that are within the spirit and scope of the invention. For example, although FIG. 1 shows volumes including one or more disks, it should be appreciated that any storage device may be used.
- FIG. 1 shows volumes including one or more disks, it should be appreciated
- FIG. 1 An example of a storage system on which aspects of the present invention may be implemented is the Symmetrix line of storage systems available from EMC Corporation, Hopkinton, Mass. Another example of a storage system on which aspects of the present invention may be implemented is the CLARiiON line of storage system, also available from EMC Corporation, Hopkinton, Mass.
- the architecture shown in FIG. 1 is by way of example, as it should be appreciated that embodiments of the invention described herein may be implemented on numerous other architectures.
- a production application residing on Hosts 140 a - 140 n and/or Source 120 may be configured for storing changes that occur in the production application. Each time the production application reads/writes data, the data involved in the read/write operation may be created and stored on Source 120 . A series of read/write operations may be performed by Source 120 . Source 120 may be able to retain information about every change to a selected application, directory, volume, or the like, over a period of time, and a user may later utilize Source 120 to access stored data.
- the present invention may provide for snapshots to be created of the data stored in Source 120 or snapshot volume at various points in time.
- the snapshots are point-in-time replicas or representations of the original data or contents of one or more volumes.
- a snapshot may be used to make an actual copy on another local and/or remote storage device. These snapshots may be recovered at a later time by reading the data from a snapshot created at a particular point in time.
- TimeFinder solution available from EMC Corporation, Hopkinton, Mass.
- TimeFinder solution includes various snapshot methods.
- One snapshot method, TimeFinder/Clone may enable the creation of a full point-in-time copy for backups.
- the full copy may be suitable to support high I/O workloads, such as data warehouse refreshes and/or any other process that requires parallel access to production data.
- Clone copies may be used to reduce disk contention and improve data access speed by assigning users to copies of data rather than accessing the one prod copy.
- TimeFinder/SNAP is a pointer-based, space-saving snapshot solution.
- TimeFinder/SNAP for virtual device copy operations, may provide multiple copies of production data for testing, backups or report generation.
- TimeFinder/SNAP may use a copy-on-first-write technique as a way to conserve disk space when making copies. Only writes to tracks on the source device or target virtual device may cause any incremental storage to be consumed.
- the space savings using TimeFinder/SNAP may be significant when the production applications change only a small percentage of data on a volume. However, some performance degradation may be expected when production applications change a large percentage of data on a volume.
- TimeFinder/SNAP may be suitable to support moderate I/O workloads.
- clone may be chosen as a snapshot method.
- a clone of Source 120 may be created and stored on Snapshot Storage Clone 132 within Target Device Group 130 .
- the clone may later be used to perform a restore operation to Source 120 .
- Data Storage System 100 may perform a restore of data from Snapshot Storage Clone 132 to Source 120 upon a request initiated by one or more Hosts 140 a - 140 n .
- Data Storage System 100 may also perform other operations, such as splitting one or more Snapshot Storage Clone 132 from Source 120 , resynchronizing Snapshot Storage Clone 132 to Source 120 , or any other type of operation involving data located on any of volumes within Data Storage System 100 .
- SNAP method may be chosen to create a point-in-time copy of Source 120 during an intelligent snapshot backup in accordance with some embodiments.
- the snapshot created using SNAP method may store the difference between snapshots instead of a full volume copy like a clone would take. Every I/O the user writes to Source 120 may be processed in a copy on a first write (i.e., the older version of the data is moved to a special volume). A read from the snapshot might result in reading from another location in the snapshot volume.
- snapshots created using SNAP method may be stored on Snapshot Storage SNAP 134 within Target Device Group 130 .
- the choice of snapshot method may be based on data change rate and policies rules and/or criteria specified in policies.
- Sever 160 may probe data change rate on Hosts 140 a - 140 n . Based on the data change rate and Policies 172 stored in Resource Database 170 , appropriate snapshot method may be chosen for a specific time period.
- Policies 172 may be stored in Resource Database 170 .
- Resource Database 170 may store configuration and consumption of system resources at a given time instance. Such information may be related to devices, schedules, hosts, groups and policies, among others. Through value changes in Resource Database 170 , settings for backup and recovery among others may be reconfigured.
- An example of a computer system, which utilizes Resource Database 170 to facilitate system configuration, is Networker, a product available from EMC Corporation, Hopkinton, Mass. Though FIG. 1 illustrates Resource Database 170 to be external to Server 160 , Resource Database 170 may reside and operate or to be operated inside or outside Server 160 .
- a policy may specify goals, metrics and/or priorities, among other parameters.
- a policy may be presented as one or more conditions and/or constraints that need to be satisfied.
- a policy may specify a snapshot method, a condition and/or constraint, and may be expressed as the following form: minimum, maximum, and snapshot method, among others. When the data change rate falls within the range of minimum and maximum, the condition may be considered satisfied and the corresponding snapshot method may be chosen.
- Simple conditions and/or constraints may be used as building blocks for complex policies. Complex policies may include combinations of disjunctive simple conditions and/or constraints, conjunctive simple conditions and/or constraints, and/or negations of individual simple conditions constraints.
- FIG. 2 illustrates an exemplary set of policies and the application of the policies to snapshot based backups, in accordance with some embodiments.
- the exemplary set of policies may include the constraints for Data Change Rate 210 and the corresponding Snapshot Method 220 .
- data changes to various sources may be tracked by a server.
- data change rate may be calculated.
- FIG. 2 at time T 1 , when it is time to perform a snapshot based backup, a data change rate for the time period T 0 to T 1 may be calculated.
- Policies may then be applied to choose a snapshot method based on the calculated data change rate.
- the application of policies makes intelligent choices of snapshot method based on data change rate fluctuation tracked by a server.
- Host A may be down for maintenance from T 0 to T 1 . Without any data changes, Source 1 for storing data generated by Host A may have a 0% data change rate from T 0 to T 1 . Applying the set of exemplary policies as shown in table 200 , the corresponding Snapshot Method 220 may be to skip the snapshot for Source 1 at T 1 . In another example, Host B may sometimes write data to Source 2 from T 0 to T 1 , which may result a 10% change rate. Applying the set of exemplary policies as shown in table 200 , the corresponding Snapshot Method 220 at T 1 for Source 2 may be WW.
- FIG. 3 is a schematic diagram illustrating policy configuration including a user interface, in accordance with some embodiments.
- Server 300 may probe the data change rate on Hosts 310 a - 310 n .
- the data change rate may be calculated at various levels. For example, the data change rate may be calculated at file system level and/or block level using methods, such as change block tracking or archive bit setting, as is well-known in the art.
- a user may specify policies in a console configuration for Server 300 .
- a user interface may present the dialog box 306 .
- Default criteria for snapshot policy properties may be checked initially. A selection of the default criteria may result storing a set of default policies and the corresponding snapshot methods in Resource Database 302 . Alternatively, the user may specify customized criteria.
- data change rates and the corresponding snapshot methods may be specified and stored in Policies 304 .
- a snapshot method may be intelligently chosen, in accordance with some embodiments.
- FIG. 4 is a flowchart illustrating a method of choosing a snapshot method and taking snapshots using the chosen snapshot method, in accordance with some embodiments.
- a data change rate may be obtained.
- the data change rate at a time instance may be obtained by calculating the amount of data changed during a period. The period may start from a previous time instance, such as the time of a previous snapshot backup, and end at a current time stance, such as the time of a current snapshot backup.
- a set of policies may be obtained. The set of policies may specify constraints as well as the corresponding snapshot methods.
- applying the set of policies to the data change rate a snapshot method may be determined.
- a snapshot based backup may be performed using the chosen snapshot method.
- the intelligent snapshot method and system described herein has several benefits.
- the intelligent snapshot method allows intelligent backup decision to be made automatically at each backup. Instead of pre-configured snapshot methods, which never account for the real-time data population patterns, the intelligent snapshot method analyzes the data change rate, then decides the most efficient and effective backup method.
- the intelligent snapshot method described herein reduces manual process, thus improves efficiency and accuracy. Instead of manual configuration for each host connected to a server, users now have a centralized location to specify the policies. Further, based on the criteria stated in the policies, different snapshot method may be chosen for different hosts. Therefore the centralized configuration reduces the overhead of managing separate resources at run time.
- snapshot backup methods in existence today require manual configuration in order to define the relationship between a source and a target.
- the manual configuration may involve hardcoding of the source and target. The coding depends heavily upon a user's knowledge and experience. Such manual process is leaving too much to chance and interpretation. Disclosed herein is to remove the user dependency and intelligently choose the most efficient target to pair with the source.
- FIG. 5 is a schematic diagram illustrating exemplary source and target pairing at various points in time, in accordance with some embodiments.
- snapshot methods may be chosen according to the embodiments described above.
- clone may be chosen as the snapshot method based on a data change rate and policy configuration.
- Source 510 may be intelligently paired with one or more Snapshot Storage Clone devices 522 , in accordance with some embodiments.
- snapshots may be taken and stored on the one or more Snapshot Storage Clone devices 522 during cloning.
- SNAP may be chosen as the snapshot method based on the system data change rate and the policy configuration.
- Source 530 may be intelligently paired with one or more Snapshot Storage SNAP devices 544 , in accordance with some embodiments. Following the pairing, snapshots may be taken and stored on the one or more Snapshot Storage Clone 544 devices during SNAP.
- a storage group may be configured to ensure that there are boundaries on the target devices for intelligent pairing.
- the boundary setup is critical since, without these boundaries, intelligent pairing may pick a target device that looks available and appropriate but is in fact simply a source for some other purpose. Using such a device for pairing may result in data loss.
- devices that can be used for pairing may be placed in the storage group, such as Target Device Group 520 and 540 shown in FIG. 5 . If a device is not in the storage group, the device may not be used for intelligent pairing, even if that device is already paired to the source.
- the intelligent pairing of devices including boundary check is further illustrated in FIG. 6 .
- FIG. 6 is a flowchart illustrating a method of intelligent pairing, in accordance with some embodiments.
- a path i.e. filesystem
- the path may be made up by a list of source LUNs.
- intelligent pairing may be performed.
- a list of devices in a storage group available to a source using the chosen snapshot method may be obtained.
- rules may be put in place to specify the criteria of device selection.
- some criteria may require that a device in the list must be in a storage group, visible, in certain state (ie, ready, not ready), not locked, and/or in an acceptable pair state (ie, split, not paired, etc). After examining the attributes of a device, only the device satisfying the criteria may be placed in the list of available devices.
- the results may be cached and reused if another request with the same snapshot method is made within a reasonable amount of time, i.e. 60 seconds.
- the length of the period is reasonable since the likelihood of a change in the results in the period may be quite low.
- a list of devices currently paired with the source using the chosen snapshot method may be obtained.
- the list of devices currently paired with the source may be generated by selecting devices out of the list of available devices. Since the list of devices currently paired with the specified source may be derived from the list of available devices, as a subset of the available devices list, the list of currently paired devices may be empty. For example, some devices may be currently paired to the source, but not available for intelligent pairing due to any of the reasons listed above (i.e. the device is locked, not in the right state etc.) and/or not in the storage group for intelligent pairing. By selecting devices out of the list of available devices, a boundary may be established to ensure that only devices configured within the storage group and in acceptable states according to the rules are used for intelligent paring.
- the currently paired list may be examined to determine if it is empty. If the currently paired list is not empty, in step 635 , the list may be sorted. For example, the sorting may be conducted according to the least to most expensive to synchronize, so that a device chosen from the beginning of the list is more likely to be already fully synchronized to the source. A device is already fully synchronized to the source takes less time to pair during provisioning, thus, is more efficient.
- possible pairing devices may be identified from the list of available devices in the group, using the source, the list of currently paired devices, and the list of available devices.
- the identification of unrelated but available devices may be conducted by eliminating devices that are not suitable for intelligent pairing.
- such devices may be the source, devices currently paired to the source, and devices smaller than the source, among others.
- the remaining devices in the list of available devices are unrelated but available devices for intelligent pairing.
- Such devices may be paired to the source, but using any of which would require a full synchronization.
- Such devices, relative to devices in the currently paired devices list may take longer to provision, since a full synchronization takes time.
- This unrelated but available list is then sorted by size in step 650 , from the smallest to largest, so that a device selected from the list is likely to be the same size as the source or not much larger.
- one or more target devices may be selected first from the currently paired list.
- the selected devices may be paired to the source in step 680 . If no devices can be selected from the currently paired list, then in step 665 , one or more target devices may be selected from the list of available devices. The selected devices may then be paired to the source in step 680 . If no devices can be selected from either list, an error message, such as “not enough resources”, may be returned in step 675 .
- an error message such as “not enough resources”
- a device is selected from the available list and is currently paired to another source, that pairing may be terminated and the device may be then paired to the given source. Although this may be drastic, it is better to get the backup done than to fail the operation with an error message such as “not enough resources”.
- intelligent pairing described herein has several benefits.
- the intelligent pairing described herein has boundary checks built in places such as the configuration of a storage group, and the usage of rules when selecting available devices for pairing. Such boundary checks reduce the chances of error at run time.
- a lookup database may be used by a backup application.
- the lookup database may keep the history of earlier mappings and may be queried. A user may manually make changes to it.
- the information in the database may be updated automatically for each backup. When backup is conducted for the first time, the database may be established. After each backup, the paring information may be recorded to the lookup database.
- An exemplary table in the lookup database is illustrated in FIG. 7 .
- FIG. 7 is a schematic diagram illustrating intelligent pairing of source and target using a lookup database, in accordance with some embodiments.
- Lookup Database 750 may include pairing information within Data Storage System 700 . Data in Lookup Database 750 may be inserted, updated and/or deleted programmatically and/or manually. Though FIG. 7 illustrates Lookup Database 750 to be external to Server 740 , Lookup Database 750 may reside and operate or to be operated inside or outside Server 160 . Similarly, though FIG. 7 illustrates Lookup Database 750 to be external to Resource Database 760 , Lookup Database 750 may reside and operate or be operated inside or outside Resource Database 760 .
- the pairing information of Source 710 and devices in Target Device Group 720 may be recorded in Lookup Database 750 .
- An exemplary table 780 with the pairing information is illustrated in FIG. 7 .
- the exemplary table 780 may include a system identification, such as an array identification 782 , a source identification 784 , a target identification 786 , a type of the target device for pairing 788 , and a timestamp recording pairing establishment 790 .
- two example systems with array ID 123 and XYXX are used in intelligent pairing.
- different source and target pairing may be established and recorded. For example, on Jun.
- one system with array ID 123 and source device ID 001 may be paired with target device 002 for BCV type of snapshot.
- another system with array ID XYXX and source device ID 001 may be paired with the same target device 002 also for BCV type of snapshot. If there is a match in the database, the backup application may check if that device is available in Target Device Group 720 and select the validated device for pairing.
- a source may be associated with an array identification and a source identification.
- the source identification may be a device identification.
- the search of matching records in the database may be conducted by locating records matching the source and a chosen snapshot method. For example, using the exemplary table 780 , the matching may be performed by comparing the array identification and the source identification associated with the source with values in column 782 and 784 , and comparing the chosen snapshot method with values in column 788 . If a row in table 780 has values equal to the chosen snapshot method and the array identification as well as the source identification associated with source, a matching record is found. If multiple records are found from Lookup Database 750 , the application may obtain the recently used, i.e. from EST_DATE column 790 in FIG. 7 .
- FIG. 8 is a flowchart illustrating a method of using a lookup table for intelligent pairing of source and target devices, in accordance with some embodiments.
- a snapshot method may be obtained, for example, using the methods described above and illustrated in FIG. 4 .
- a source to be backed up may be located.
- lookup table may be searched for the source and the snapshot method. For example, in the exemplary table illustrated in FIG. 7 , records in the lookup table with source identification matching the source and type value matching the snapshot method may be selected. If such records are located in the lookup table, in step 830 , the corresponding target devices in the pairing records may be obtained.
- one or more target devices may be located in a storage group using the snapshot method.
- the method illustrated in FIG. 6 may be used to locate the one or more targeted devices in the storage group and pair the located devices with source. Additional criteria may be specified in the rules used in step 610 .
- the corresponding target devices may then be validated in step 835 .
- the validation may be based on rules and by locating the corresponding target devices in a storage group. For example, the rules may require that a corresponding device must be in a storage group, visible, in certain state (ie, ready, not ready), not locked, and/or in an acceptable pair state (ie, split, not paired, etc.) Additional rules, such as the preference for a thin device, may also be built in the validation.
- the validation may be used to ensure that a potential pairing device located in the lookup table is within the boundary built by the rules and the storage group.
- a device although may have been used for intelligent pairing previously and the pairing may have been recorded in the lookup table, may not currently be suitable for pairing for reasons such as not in a storage group, not visible, not in certain state, locked, and/or in an unacceptable pairing state, among others. Thus, the validation is necessary for the boundary check of intelligent pairing.
- step 850 one or more target devices may be located in a storage group using rules.
- the method illustrated in FIG. 6 may be used to locate the one or more targeted devices in the storage group and pair the located devices with source. Additional criteria may be specified in the rules used in step 610 .
- pairing of source and target may be established and snapshots may be taken in step 880 . If following step 850 , no target devices may be located, an error message may be given in step 860 .
- the intelligent pairing disclosed herein may be used not only at backup time, but also at configuration time.
- configuration wizard may invoke intelligent pairing during a dry run exercise, to ensure that the new resource and/or the changes to the resource are unlikely to fail at backup time. This would provide an opportunity for the user to make needed corrections, allocations or configurations prior to attempting a backup.
- a user may continue specifying source and target pairing in configuration files.
- the use of intelligent pairing may be done when the pairing in configuration file fails or when the configuration file does not exist. There will continue to situations where the user will want or need to specify the source and target pairings in the configuration files.
- Intelligent pairing and configuration files may both be used in a single backup. For instance, the user might want to specify the pairing for a given source by using the configuration files.
- intelligent pairing may be used to find a target to pair with it and the backup completes successfully instead of failing inexplicably with “not enough resources.”
- intelligent pairing is used in place of user specified pairing configuration, the user may be alerted for incorrect or missing configuration.
- FIG. 9 is a flowchart illustrating using intelligent pairing during configuration of snapshot based backups, in accordance with some embodiments.
- the pairing between the resource and devices in a storage group may be validated to ensure that devices are snapshot ready.
- a snapshot method may be obtained.
- the snapshot method may be specified by a user during configuration.
- a source to be backed up may be obtained. For example, when a new resource is added to a system, a user may select all or some of the filesystems for which he needs to perform the validation. Source LUNs making up the filesystem may then be obtained.
- validations may include validating the appropriate OS level and/or software, validating path, and/or validating the availability of volume layout, among others.
- pairing configuration specified in the system may be obtained.
- such configuration may be specified by a user and stored in configuration files. If the pairing configuration is located, in step 930 , corresponding target devices for the source may be obtained from the pairing configuration. If no such pairing configuration are located, in step 950 , one or more target devices may be located in a storage group. In some embodiments, the method illustrated in FIG. 6 may be used to locate the one or more target devices in the storage group. Additional criteria may be specified in the rules used in step 610 .
- the corresponding target devices may then be validated in step 935 using rules.
- the rules may specify criteria requiring a corresponding device must be in a storage group, visible, in certain state (ie, ready, not ready), not locked, and/or in an acceptable pair state (ie, split, not paired, etc.) After examining the attributes of a device, only the device satisfying the criteria may be considered valid. Additional rules, such as the preference for a thin device, may also be built in the validation. The validation may be used to ensure that during a snapshot backup, at least one target device from the storage group is available to be paired with the source using the chosen snapshot method.
- step 950 one or more target devices may be located in a storage group using rules.
- the method illustrated in FIG. 6 may be used to locate the one or more targeted devices in the storage group and pair the located devices with source. Additional criteria may be specified in the rules used in step 610 .
- successful validation message may be taken in step 980 . If following step 950 , no target devices may be located, an error message may be given in step 960 .
- More than one computer may be used, such as by using multiple computers in a parallel or load-sharing arrangement or distributing tasks across multiple computers such that, as a whole, they perform the functions of the components identified herein; i.e. they take the place of a single computer.
- Various functions described above may be performed by a single process or groups of processes, on a single computer or distributed over several computers. Processes may invoke other processes to handle certain tasks.
- a single storage device may be used, or several may be used to take the place of a single storage device.
- the present embodiments are to be considered as illustrative and not restrictive, and the invention is not to be limited to the details given herein. It is therefore intended that the disclosure and following claims be interpreted as covering all such alterations and modifications as fall within the true spirit and scope of the invention.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims (16)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/842,710 US9355104B1 (en) | 2013-03-15 | 2013-03-15 | Intelligent pairing using a lookup database for snapshot based backups |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/842,710 US9355104B1 (en) | 2013-03-15 | 2013-03-15 | Intelligent pairing using a lookup database for snapshot based backups |
Publications (1)
Publication Number | Publication Date |
---|---|
US9355104B1 true US9355104B1 (en) | 2016-05-31 |
Family
ID=56027841
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US13/842,710 Active 2034-03-16 US9355104B1 (en) | 2013-03-15 | 2013-03-15 | Intelligent pairing using a lookup database for snapshot based backups |
Country Status (1)
Country | Link |
---|---|
US (1) | US9355104B1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170139950A1 (en) * | 2014-05-30 | 2017-05-18 | Datto, Inc. | Management of data replication and storage apparatuses, methods and systems |
US9830228B1 (en) * | 2015-10-01 | 2017-11-28 | EMC IP Holding Company LLC | Intelligent backup model for snapshots |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050033777A1 (en) * | 2003-08-04 | 2005-02-10 | Moraes Mark A. | Tracking, recording and organizing changes to data in computer systems |
US20080168183A1 (en) * | 2007-01-08 | 2008-07-10 | Apple Computer, Inc. | N-way synchronization of data |
US20140149670A1 (en) * | 2012-11-29 | 2014-05-29 | Infinidat Ltd. | Storage System and Method of Operating Thereof |
-
2013
- 2013-03-15 US US13/842,710 patent/US9355104B1/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050033777A1 (en) * | 2003-08-04 | 2005-02-10 | Moraes Mark A. | Tracking, recording and organizing changes to data in computer systems |
US20080168183A1 (en) * | 2007-01-08 | 2008-07-10 | Apple Computer, Inc. | N-way synchronization of data |
US20140149670A1 (en) * | 2012-11-29 | 2014-05-29 | Infinidat Ltd. | Storage System and Method of Operating Thereof |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170139950A1 (en) * | 2014-05-30 | 2017-05-18 | Datto, Inc. | Management of data replication and storage apparatuses, methods and systems |
US10055424B2 (en) * | 2014-05-30 | 2018-08-21 | Datto, Inc. | Management of data replication and storage apparatuses, methods and systems |
US10515057B2 (en) | 2014-05-30 | 2019-12-24 | Datto, Inc. | Management of data replication and storage apparatuses, methods and systems |
US9830228B1 (en) * | 2015-10-01 | 2017-11-28 | EMC IP Holding Company LLC | Intelligent backup model for snapshots |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9323760B1 (en) | Intelligent snapshot based backups | |
JP7086093B2 (en) | Synchronously replicating datasets and other managed objects to cloud-based storage systems | |
US11003476B2 (en) | Entity database historical data | |
US10852961B2 (en) | Overlapping write detection and processing for sync replication | |
US9400613B1 (en) | Intelligent pairing for snapshot based backups | |
US7257690B1 (en) | Log-structured temporal shadow store | |
US8738883B2 (en) | Snapshot creation from block lists | |
US7870353B2 (en) | Copying storage units and related metadata to storage | |
US20080065587A1 (en) | Data management system and data management method | |
CN104750773A (en) | Index maintenance based on a comparison of rebuild vs. update | |
US20080104131A1 (en) | Method and system for synchronizing direct access storage volumes | |
JP2009519522A (en) | Computer programs, systems, and methods for generating backup sets within a data processing system (generating a backup set to a specific point in time) | |
CN107656705B (en) | Computer storage medium and data migration method, device and system | |
US20140358858A1 (en) | Determining A Schedule For A Job To Replicate An Object Stored On A Storage Appliance | |
EP3895033A1 (en) | Efficient database migration using an intermediary secondary storage system | |
US9749193B1 (en) | Rule-based systems for outcome-based data protection | |
WO2016111673A1 (en) | Multi-tenant upgrading | |
US9164691B1 (en) | Intelligent configuration for snapshot based backups | |
US9557932B1 (en) | Method and system for discovering snapshot information based on storage arrays | |
US9355104B1 (en) | Intelligent pairing using a lookup database for snapshot based backups | |
KR101989074B1 (en) | Migration based on replication log in database sharding environment | |
US20200142995A1 (en) | Intelligently Scheduling Resynchronization Jobs in a Distributed Object-Based Storage System | |
JP2008515111A (en) | File index processing | |
CN108959300B (en) | File storage method and storage device | |
CN108376104B (en) | Node scheduling method and device and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHOPRA, SHELESH;MATTHIES, ERIC CHRISTIAN;WROTEN, CHRISTOPHER FRANCIS;SIGNING DATES FROM 20130314 TO 20130318;REEL/FRAME:030060/0233 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT, TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001 Effective date: 20160907 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENT, NORTH CAROLINA Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001 Effective date: 20160907 Owner name: CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLAT Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040134/0001 Effective date: 20160907 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., A Free format text: SECURITY AGREEMENT;ASSIGNORS:ASAP SOFTWARE EXPRESS, INC.;AVENTAIL LLC;CREDANT TECHNOLOGIES, INC.;AND OTHERS;REEL/FRAME:040136/0001 Effective date: 20160907 |
|
AS | Assignment |
Owner name: EMC IP HOLDING COMPANY LLC, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:EMC CORPORATION;REEL/FRAME:040203/0001 Effective date: 20160906 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., T Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES, INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:049452/0223 Effective date: 20190320 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., TEXAS Free format text: SECURITY AGREEMENT;ASSIGNORS:CREDANT TECHNOLOGIES INC.;DELL INTERNATIONAL L.L.C.;DELL MARKETING L.P.;AND OTHERS;REEL/FRAME:053546/0001 Effective date: 20200409 |
|
AS | Assignment |
Owner name: WYSE TECHNOLOGY L.L.C., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: MOZY, INC., WASHINGTON Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: MAGINATICS LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: FORCE10 NETWORKS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: EMC IP HOLDING COMPANY LLC, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: EMC CORPORATION, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL SYSTEMS CORPORATION, TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL SOFTWARE INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL MARKETING L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL INTERNATIONAL, L.L.C., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: CREDANT TECHNOLOGIES, INC., TEXAS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: AVENTAIL LLC, CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 Owner name: ASAP SOFTWARE EXPRESS, INC., ILLINOIS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH;REEL/FRAME:058216/0001 Effective date: 20211101 |
|
AS | Assignment |
Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (040136/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061324/0001 Effective date: 20220329 |
|
AS | Assignment |
Owner name: SCALEIO LLC, MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: EMC IP HOLDING COMPANY LLC (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: EMC CORPORATION (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC), MASSACHUSETTS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC. AND WYSE TECHNOLOGY L.L.C.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL PRODUCTS L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL INTERNATIONAL L.L.C., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL USA L.P., TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING L.P. (ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 Owner name: DELL MARKETING CORPORATION (SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC.), TEXAS Free format text: RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL/FRAME (045455/0001);ASSIGNOR:THE BANK OF NEW YORK MELLON TRUST COMPANY, N.A., AS NOTES COLLATERAL AGENT;REEL/FRAME:061753/0001 Effective date: 20220329 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |